Competition Network-Hacker Weapon spectrum Rankings _ Web surfing

Source: Internet
Author: User
Vertical and horizontal in the hacker rivers and lakes, not a few gratified weapons how can foothold? This column will be indefinite journal of hackers commonly used heavyweight weapons, I hope to understand the readers, learning Network security technology guidance.

No.1 know how to kill with a knife is not difficult, to know how to save with a knife, but it is a difficult thing.

Weapon Name: X-scan

Kill index: ★★★★☆

Unique skills: The use of multithreading to specify the IP address Segment Security vulnerability detection, support plug-ins, provides a graphical interface and command line two ways to operate. Scanning includes: remote service type, operating system type and version, a variety of weak password vulnerabilities, backdoor, application service vulnerabilities, network equipment vulnerabilities, denial of service vulnerabilities, such as more than 20 categories, support online upgrades, is one of the best security scanning software. It is usually used to search for chickens before hacking attacks.

No.2 a person's life must be forced to do a few things they do not want to do, such a life is meaningful.

Weapon Name: Streamer

Kill index: ★★★★☆

Unique skills: You can detect POP3, FTP, HTTP, PROXY, FORM, SQL, SMTP, ipc$ on various vulnerabilities, and designed for various vulnerabilities of different solutions, can easily get the detected user password on the vulnerable system, and then control the guest and administrator rights. Both novice and veteran hackers have favored it. Every day a large number of victims want to cry without tears.

No.3 if there is more headache than meeting a shrew, it is to meet a group of shrew.

Weapon Name: DDoS series

Kill index: ★★★★★

Unique stunt: Distributed denial of service attacks, more difficult to prevent the attack means. With the help of a certain number of puppet machines, the attackers put forward excessive and reasonable service requests to occupy the attacking object system and network resources, resulting in paralysis and collapse of the target.

The hacker's divine weapon is numerous, the good handles hacker can also conveniently create the specialized tool. How big the heart is, how big the stage is. Are these even the most powerful weapons of hackers? Of course not, the most powerful weapon of hackers is their smile.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.